/cons/2600/The Eleventh HOPE (2016)/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
The Eleventh HOPE (2016) Ask the EFF.mp4248.5 MiB2017-Feb-28 14:33
The Eleventh HOPE (2016) Biology for Hackers and Hacking for Biology.mp4116.4 MiB2017-Feb-28 14:39
The Eleventh HOPE (2016) Bringing Down the Great Cryptowall.mp4203.4 MiB2017-Feb-28 14:45
The Eleventh HOPE (2016) Bringing Down the Great Cryptowall.srt146.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Can We Sue Ourselves Secure The Legal Systems Role in Protecting Us.mp4215.8 MiB2017-Feb-28 14:51
The Eleventh HOPE (2016) Can We Sue Ourselves Secure The Legal Systems Role in Protecting Us.srt126.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Closing Ceremonies.mp4373.1 MiB2017-Feb-28 15:01
The Eleventh HOPE (2016) Crypto War II Updates from the Trenches.mp4233.3 MiB2017-Feb-28 15:10
The Eleventh HOPE (2016) F ck it, Well Do It Live Eight Years of Radio Statler!.mp4259.7 MiB2017-Feb-28 15:19
The Eleventh HOPE (2016) FOIA at Fifty.mp4314.3 MiB2017-Feb-28 15:32
The Eleventh HOPE (2016) FOIA at Fifty.srt142.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Freedom and Privacy in Our Lives, Our Governments, and Our Schools.mp4651.6 MiB2017-Feb-28 15:49
The Eleventh HOPE (2016) Hacking Machine Learning Algorithms.mp4208.5 MiB2017-Feb-28 15:57
The Eleventh HOPE (2016) How Anonymous Narrowly Evaded Being Framed as Cyberterrorists.mp4223.1 MiB2017-Feb-28 16:05
The Eleventh HOPE (2016) I Hacked for China.mp492.4 MiB2017-Feb-28 16:11
The Eleventh HOPE (2016) Keynote Address - Cory Doctorow - YouTube.mp4421.5 MiB2017-Feb-28 16:27
The Eleventh HOPE (2016) Leak Hypocrisy Whistleblowers, Sources, & the Label Espionage.mp4119.8 MiB2017-Feb-28 16:33
The Eleventh HOPE (2016) Leak Hypocrisy Whistleblowers, Sources, & the Label Espionage.srt119.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) LinkNYC Spy Stations.mp4258.8 MiB2017-Feb-28 16:40
The Eleventh HOPE (2016) LinkNYC Spy Stations.srt121.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) LockSport Roadshow Bring Your Oddities!.mp4522.0 MiB2017-Feb-28 17:06
The Eleventh HOPE (2016) Lockpicking in Real Life versus on the Screen - YouTube.mp4224.4 MiB2017-Feb-28 16:47
The Eleventh HOPE (2016) Lockpicking in Real Life versus on the Screen - YouTube.srt157.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Monitoring Dusty War Zones and Tropical Paradises.mp4225.3 MiB2017-Feb-28 17:13
The Eleventh HOPE (2016) Now and Then, Here and There.mp4214.1 MiB2017-Feb-28 17:20
The Eleventh HOPE (2016) Now and Then, Here and There.srt141.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Privacy Badger and Panopticlick vs. the Trackers, Round 1.mp4225.7 MiB2017-Feb-28 17:27
The Eleventh HOPE (2016) Privacy, Anonymity, and Individuality - The Final Battle Begins.mp4643.0 MiB2017-Feb-28 17:46
The Eleventh HOPE (2016) SecureDrop Two Years On and Beyond.mp4237.7 MiB2017-Feb-28 17:54
The Eleventh HOPE (2016) Social Engineering.mp4319.0 MiB2017-Feb-28 18:03
The Eleventh HOPE (2016) Social Engineering.srt141.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Stealing Bitcoin with Math.mp4163.8 MiB2017-Feb-28 18:09
The Eleventh HOPE (2016) Stealing Bitcoin with Math.srt115.3 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) TSA Keys Leak Government Backdoors and the Dangers of Security Theater.mp4276.3 MiB2017-Feb-28 18:58
The Eleventh HOPE (2016) TSA Keys Leak Government Backdoors and the Dangers of Security Theater.srt145.3 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Black Holes in Our Surveillance Map.mp4231.4 MiB2017-Feb-28 18:16
The Eleventh HOPE (2016) The Black Holes in Our Surveillance Map.srt145.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Internet Society.mp444.1 MiB2017-Feb-28 18:17
The Eleventh HOPE (2016) The Mathematical Mesh and the New Cryptography.mp4195.3 MiB2017-Feb-28 18:24
The Eleventh HOPE (2016) The Mathematical Mesh and the New Cryptography.srt126.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Next Billion Certificates Lets Encrypt and Scaling the Web PKI.mp4165.7 MiB2017-Feb-28 18:30
The Eleventh HOPE (2016) The Next Billion Certificates Lets Encrypt and Scaling the Web PKI.srt129.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Onion Report.mp4222.2 MiB2017-Feb-28 18:38
The Eleventh HOPE (2016) The Panama Papers and the Law Firm Behind It.mp4178.9 MiB2017-Feb-28 18:44
The Eleventh HOPE (2016) This Key is Your Key, This Key is My Key.mp4166.9 MiB2017-Feb-28 18:51
The Eleventh HOPE (2016) This Key is Your Key, This Key is My Key.srt157.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) When Vulnerability Disclosure Turns Ugly.mp4236.0 MiB2017-Feb-28 19:06
The Eleventh HOPE (2016) Women in Cyber Security.mp4268.3 MiB2017-Feb-28 19:14
The Eleventh HOPE (2016) Women in Cyber Security.srt126.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) 2016 Car Hacking Tools.mp4138.0 MiB2017-Feb-28 19:16
The Eleventh HOPE (2016) 2016 Car Hacking Tools.srt155.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) A Penetration Testers Guide to the Azure Cloud.mp4116.0 MiB2017-Feb-28 19:17
The Eleventh HOPE (2016) A Penetration Testers Guide to the Azure Cloud.srt106.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Accessibility A Creative Challenge to Living without Sight.mp4186.3 MiB2017-Feb-28 19:20
The Eleventh HOPE (2016) Accessibility A Creative Challenge to Living without Sight.srt88.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) All Ages How to Build a Movement.mp4200.5 MiB2017-Feb-28 19:24
The Eleventh HOPE (2016) All Ages How to Build a Movement.srt122.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Anti-Forensics AF.mp4127.8 MiB2017-Feb-28 19:27
The Eleventh HOPE (2016) Anti-Forensics AF.srt102.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Attacking the Source Surreptitious Software Features.mp4125.1 MiB2017-Feb-28 19:30
The Eleventh HOPE (2016) Attacking the Source Surreptitious Software Features.srt115.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Bring the Noise Ten Years of Obfuscation as Counter-Surveillance.mp4151.1 MiB2017-Feb-28 19:34
The Eleventh HOPE (2016) Bring the Noise Ten Years of Obfuscation as Counter-Surveillance.srt99.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Building Your Own Tor-centric ISP for Fun and (non)Profit.mp4114.5 MiB2017-Feb-28 19:37
The Eleventh HOPE (2016) Building Your Own Tor-centric ISP for Fun and (non)Profit.srt132.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) CAPTCHAs - Building and Breaking.mp4129.8 MiB2017-Feb-28 19:40
The Eleventh HOPE (2016) CAPTCHAs - Building and Breaking.srt118.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Censorship, Social Media, and the Presidential Election.mp4114.9 MiB2017-Feb-28 19:42
The Eleventh HOPE (2016) Censorship, Social Media, and the Presidential Election.srt131.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Censorship- and Coercion-Resistant Network Architectures.mp4167.1 MiB2017-Feb-28 19:46
The Eleventh HOPE (2016) Censorship- and Coercion-Resistant Network Architectures.srt111.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Chinese Mechanical Locks - Insight into a Hidden World of Locks.mp4185.0 MiB2017-Feb-28 19:50
The Eleventh HOPE (2016) Chinese Mechanical Locks - Insight into a Hidden World of Locks.srt143.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Code is from Mars, the Courts are from Venus - Reverse Engineering.mp4172.0 MiB2017-Feb-28 19:53
The Eleventh HOPE (2016) Code is from Mars, the Courts are from Venus - Reverse Engineering.srt143.3 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Coding by Voice with Open Source Speech Recognition.mp4156.9 MiB2017-Feb-28 19:57
The Eleventh HOPE (2016) Coding by Voice with Open Source Speech Recognition.srt135.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Come into My (Biohacking) Lab and See Whats on the Slab - YouTube.mp4160.8 MiB2017-Feb-28 20:00
The Eleventh HOPE (2016) Come into My (Biohacking) Lab and See Whats on the Slab - YouTube.srt137.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Computer Science Curriculas Failure - What Can We Do Now.mp4184.0 MiB2017-Feb-28 20:04
The Eleventh HOPE (2016) Computer Science Curriculas Failure - What Can We Do Now.srt132.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Constructing Exocortices with Huginn and Halo.mp4143.3 MiB2017-Feb-28 20:08
The Eleventh HOPE (2016) Constructing Exocortices with Huginn and Halo.srt147.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Cory Doctorow Contest Winner Interviews.mp4119.6 MiB2017-Feb-28 20:10
The Eleventh HOPE (2016) Cory Doctorow Contest Winner Interviews.srt48.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) De-Anonymizing Bitcoin One Transaction at a Time.mp4118.9 MiB2017-Feb-28 20:12
The Eleventh HOPE (2016) De-Anonymizing Bitcoin One Transaction at a Time.srt136.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Deconstructing Ad Networks for Fun and Profit.mp4146.3 MiB2017-Feb-28 20:16
The Eleventh HOPE (2016) Deconstructing Ad Networks for Fun and Profit.srt154.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Democratizing Wireless Networks with LimeSDR.mp4149.2 MiB2017-Feb-28 20:19
The Eleventh HOPE (2016) Democratizing Wireless Networks with LimeSDR.srt95.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Detour Through Their Minds How Everyday People Think the Internet Works.mp4181.2 MiB2017-Feb-28 20:23
The Eleventh HOPE (2016) Detour Through Their Minds How Everyday People Think the Internet Works.srt169.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) FOIA and Public Records Hacking Dox Yourself via the Privacy Act.mp4160.5 MiB2017-Feb-28 20:26
The Eleventh HOPE (2016) FOIA and Public Records Hacking Dox Yourself via the Privacy Act.srt148.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Go Hack Yourself!.mp4192.2 MiB2017-Feb-28 20:30
The Eleventh HOPE (2016) Go Hack Yourself!.srt145.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Hackers Are Whistleblowers Too The Courage Foundation.mp4284.8 MiB2017-Feb-28 20:34
The Eleventh HOPE (2016) Hackers Are Whistleblowers Too The Courage Foundation.srt145.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Hackers Got Talent.mp4666.8 MiB2017-Feb-28 20:40
The Eleventh HOPE (2016) Hacking DNA Heritage and Health Care.mp4143.3 MiB2017-Feb-28 20:43
The Eleventh HOPE (2016) Hacking DNA Heritage and Health Care.srt94.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Hacking Housing.mp4207.9 MiB2017-Feb-28 20:47
The Eleventh HOPE (2016) Hacking Housing.srt134.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Hacking Sex Toys, Tools, and Tips for Empowerment and Pleasure.mp4163.4 MiB2017-Feb-28 20:51
The Eleventh HOPE (2016) Hacking Sex Toys, Tools, and Tips for Empowerment and Pleasure.srt142.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Hacking through Business Theory and Logistics.mp4361.5 MiB2017-Feb-28 20:57
The Eleventh HOPE (2016) How to Start a Crypto Party.mp4160.2 MiB2017-Feb-28 21:01
The Eleventh HOPE (2016) How to Start a Crypto Party.srt131.8 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) How to Torrent a Pharmaceutical Drug.mp4191.0 MiB2017-Feb-28 21:04
The Eleventh HOPE (2016) How to Torrent a Pharmaceutical Drug.srt122.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Information Overload and the Last Foot Problem.mp4168.9 MiB2017-Feb-28 21:08
The Eleventh HOPE (2016) Information Overload and the Last Foot Problem.srt133.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Iridium Satellite Hacking.mp4197.1 MiB2017-Feb-28 21:12
The Eleventh HOPE (2016) Iridium Satellite Hacking.srt135.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Is the Brain the Next Hackable Driver.mp4119.9 MiB2017-Feb-28 21:15
The Eleventh HOPE (2016) Is the Brain the Next Hackable Driver.srt106.3 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Matehacking Legalizing Autonomous Production and Permaculture.mp4174.4 MiB2017-Feb-28 21:19
The Eleventh HOPE (2016) Matehacking Legalizing Autonomous Production and Permaculture.srt137.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Medical Devices Pwnage and Honeypots.mp4165.0 MiB2017-Feb-28 21:22
The Eleventh HOPE (2016) Medical Devices Pwnage and Honeypots.srt148.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Mesh VPN with Service Delivery.mp4154.3 MiB2017-Feb-28 21:26
The Eleventh HOPE (2016) Mesh VPN with Service Delivery.srt150.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) National Security Letters The Checks and Balances Arent Enough.mp4153.3 MiB2017-Feb-28 21:30
The Eleventh HOPE (2016) National Security Letters The Checks and Balances Arent Enough.srt112.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Only You Can Stop Police Surveillance - Heres How.mp4140.3 MiB2017-Feb-28 21:31
The Eleventh HOPE (2016) Only You Can Stop Police Surveillance - Heres How.srt148.1 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Open Microphone.mp4275.3 MiB2017-Feb-28 21:36
The Eleventh HOPE (2016) Open Source Malware Lab.mp4231.1 MiB2017-Feb-28 21:40
The Eleventh HOPE (2016) Open Source Malware Lab.srt123.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Orbital Mechanics Ate My Weblog.mp4144.5 MiB2017-Feb-28 21:43
The Eleventh HOPE (2016) Orbital Mechanics Ate My Weblog.srt116.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Presidential Twitter Bot Experience.mp4101.7 MiB2017-Feb-28 21:45
The Eleventh HOPE (2016) Presidential Twitter Bot Experience.srt75.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Security Options for High Risk Travelers.mp474.3 MiB2017-Feb-28 21:47
The Eleventh HOPE (2016) Security Options for High Risk Travelers.srt180.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Seven Continents A Telecom Informer World Tour.mp4144.3 MiB2017-Feb-28 21:49
The Eleventh HOPE (2016) Seven Continents A Telecom Informer World Tour.srt128.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Show Networks.mp476.2 MiB2017-Feb-28 21:51
The Eleventh HOPE (2016) Show Networks.srt111.6 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Smart Cities and Blockchains New Techno-Utopian Dreams or Nightmares.mp4130.8 MiB2017-Feb-28 21:53
The Eleventh HOPE (2016) Smart Cities and Blockchains New Techno-Utopian Dreams or Nightmares.srt129.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Spy Hard with a Vengeance How One City Stood up to DHS.mp4223.8 MiB2017-Feb-28 21:57
The Eleventh HOPE (2016) Spy Hard with a Vengeance How One City Stood up to DHS.srt147.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Sunset or Evolution of the PSTN.mp4234.4 MiB2017-Feb-28 22:01
The Eleventh HOPE (2016) Sunset or Evolution of the PSTN.srt142.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Surveillance Gives Me Chills.mp4238.1 MiB2017-Feb-28 22:05
The Eleventh HOPE (2016) Surveillance Gives Me Chills.srt117.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Code Archive.mp4125.9 MiB2017-Feb-28 22:07
The Eleventh HOPE (2016) The Code Archive.srt130.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Ownerless Library.mp4176.1 MiB2017-Feb-28 22:10
The Eleventh HOPE (2016) The Ownerless Library.srt98.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Phuture of Phreaking.mp473.1 MiB2017-Feb-28 22:12
The Eleventh HOPE (2016) The Phuture of Phreaking.srt45.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Securitization of Cyberspace and Its Impact on Human Rights.mp4311.5 MiB2017-Feb-28 22:16
The Eleventh HOPE (2016) The Securitization of Cyberspace and Its Impact on Human Rights.srt130.3 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) The Silk Road to Life without Parole - The Trial of Ross Ulbricht.mp4232.0 MiB2017-Feb-28 22:19
The Eleventh HOPE (2016) The Silk Road to Life without Parole - The Trial of Ross Ulbricht.srt142.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Tuning in to New York Citys Pirates of the Air.mp4168.6 MiB2017-Feb-28 22:23
The Eleventh HOPE (2016) Understanding Tor Onion Services and Their Use Cases.mp4234.4 MiB2017-Feb-28 22:27
The Eleventh HOPE (2016) Understanding Tor Onion Services and Their Use Cases.srt143.2 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Water Security Are We in De-Nile or In-Seine.mp4132.1 MiB2017-Feb-28 22:30
The Eleventh HOPE (2016) Water Security Are We in De-Nile or In-Seine.srt124.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) What Really Happened Fact, Truth, and Research Techniques.mp4119.1 MiB2017-Feb-28 22:38
The Eleventh HOPE (2016) What Really Happened Fact, Truth, and Research Techniques.srt125.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) What is a Neutral Network Anyway An Exploration of Net Neutrality.mp4277.3 MiB2017-Feb-28 22:34
The Eleventh HOPE (2016) What is a Neutral Network Anyway An Exploration of Net Neutrality.srt146.0 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) What the Fuck Are You Talking About Storytelling for Hackers.mp4227.5 MiB2017-Feb-28 22:42
The Eleventh HOPE (2016) What the Fuck Are You Talking About Storytelling for Hackers.srt126.4 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) What the Hack Perceptions of Hackers & Cybercriminals in Popular Culture.mp466.9 MiB2017-Feb-28 22:45
The Eleventh HOPE (2016) What the Hack Perceptions of Hackers & Cybercriminals in Popular Culture.srt104.9 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) When Video Is Not Standard Output.mp4154.2 MiB2017-Feb-28 22:48
The Eleventh HOPE (2016) When Video Is Not Standard Output.srt108.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Whos Killing Crypto.mp4184.1 MiB2017-Feb-28 22:51
The Eleventh HOPE (2016) Whos Killing Crypto.srt138.7 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Wont Somebody Please Think of the Journalists.mp4126.2 MiB2017-Feb-28 22:53
The Eleventh HOPE (2016) Wont Somebody Please Think of the Journalists.srt66.5 KiB2017-Feb-27 14:13
The Eleventh HOPE (2016) Your Level-Building Tool is Our Sound Stage.mp4143.5 MiB2017-Feb-28 22:55
The Eleventh HOPE (2016) Your Level-Building Tool is Our Sound Stage.srt109.1 KiB2017-Feb-27 14:13